SUSE-SU-2020:1363-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:1363-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2020:1363-1
Related
Published
2020-05-21T14:55:21Z
Modified
2020-05-21T14:55:21Z
Summary
Security update for tomcat
Details

This update for tomcat fixes the following issues:

  • Update to Tomcat 9.0.35. See changelog at http://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat9.0.35(markt)

  • CVE-2020-9484 (bsc#1171928) Apache Tomcat Remote Code Execution via session persistence

    If an attacker was able to control the contents and name of a file on a server configured to use the PersistenceManager, then the attacker could have triggered a remote code execution via deserialization of the file under their control.

References

Affected packages

SUSE:Linux Enterprise Module for Web and Scripting 15 SP1 / tomcat

Package

Name
tomcat
Purl
purl:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.35-4.30.2

Ecosystem specific

{
    "binaries": [
        {
            "tomcat-lib": "9.0.35-4.30.2",
            "tomcat-webapps": "9.0.35-4.30.2",
            "tomcat-servlet-4_0-api": "9.0.35-4.30.2",
            "tomcat": "9.0.35-4.30.2",
            "tomcat-el-3_0-api": "9.0.35-4.30.2",
            "tomcat-admin-webapps": "9.0.35-4.30.2",
            "tomcat-jsp-2_3-api": "9.0.35-4.30.2"
        }
    ]
}